Trusted IDs Gain Acceptance in Smart Building Environment

A majority of survey respondents believe identities can be connected across multiple systems and devices through a single ID card or mobile phone.

As smart buildings increasingly pop up on the corporate landscape, the need to connect these intelligent structures to workers will increasingly grow, according to a survey released today by IFSEC Global.

According to the survey, 85% of survey respondents know that identities can be connected to various systems and devices, while more than 60% feel having all their identities on one ID card or mobile device will give them operational efficiencies.

"The study reveals how trusted IDs offer a viable alternative for achieving a connected building at lower cost, better ROI and improved user experience – all by providing systems with knowledge of identities and their authorizations for access to elevators, parking garages, vending machines, printers and other systems," says Ashish Malpani, product marketing director with HID Global, which sponsored the survey.

The survey found that 45% of respondents believe asset tracking will be one of the likely systems to be added to smart buildings in the future, while 46% think multi-factor authentication will make the list.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

An exploitable command injection vulnerability exists in the measurementBitrateExec functionality of Sony IPELA E Series Network Camera G5 firmware 1.87.00. A specially crafted GET request can cause arbitrary commands to be executed. An attacker can send an HTTP request to trigger this vulnerability...

In Eclipse Vert.x version 3.0 to 3.5.1, the HttpServer response headers and HttpClient request headers do not filter carriage return and line feed characters from the header value. This allow unfiltered values to inject a new header in the client request or server response.

In Eclipse OpenJ9 version 0.8, users other than the process owner may be able to use Java Attach API to connect to an Eclipse OpenJ9 or IBM JVM on the same machine and use Attach API operations, which includes the ability to execute untrusted native code. Attach API is enabled by default on Windows,...

Systems with microprocessors utilizing speculative execution and Intel software guard extensions (Intel SGX) may allow unauthorized disclosure of information residing in the L1 data cache from an enclave to an attacker with local user access via a side-channel analysis.